Kin Visitantes Security & Risk Analysis

wordpress.org/plugins/kin-visitantes

Track visitors to your website easily and effectively.

10 active installs v2.4 PHP + WP 3.0.1+ Updated Dec 30, 2014
analyticsanalytics-dashboardstatisticsstatstracking
85
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is Kin Visitantes Safe to Use in 2026?

Generally Safe

Score 85/100

Kin Visitantes has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 11yr ago
Risk Assessment

The plugin "kin-visitantes" v2.4 exhibits a mixed security posture. On one hand, the static analysis reveals a very small attack surface with no detected AJAX handlers, REST API routes, shortcodes, or cron events. Furthermore, all SQL queries are reported as using prepared statements, and there are no file operations or external HTTP requests, which are positive signs. However, a significant concern arises from the output escaping results: 100% of the 18 analyzed outputs are not properly escaped. This indicates a high risk of Cross-Site Scripting (XSS) vulnerabilities, as user-supplied data displayed on the front-end or back-end might not be neutralized, allowing malicious scripts to be injected and executed.

The taint analysis, while reporting no critical or high severity flows, does identify 3 flows with unsanitized paths. Although the severity isn't explicitly stated as critical, unsanitized paths can often lead to security issues if not handled correctly, especially when combined with the lack of output escaping. The vulnerability history is currently clean, with no recorded CVEs, which is a positive indicator of the plugin's past security. However, the absence of past vulnerabilities does not guarantee future security, especially given the identified output escaping and unsanitized path issues.

In conclusion, while "kin-visitantes" v2.4 has strengths in its limited attack surface and secure SQL practices, the complete lack of output escaping for all analyzed outputs presents a critical security weakness. This, coupled with the presence of unsanitized paths, creates a substantial risk of XSS attacks. The plugin's clean vulnerability history is a good sign, but it should not overshadow the immediate concerns identified in the static analysis.

Key Concerns

  • Unescaped output on all analyzed outputs
  • Taint flows with unsanitized paths
Vulnerabilities
None known

Kin Visitantes Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

Kin Visitantes Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
18
0 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

0% escaped18 total outputs
Data Flows
3 unsanitized

Data Flow Analysis

3 flows3 with unsanitized paths
show_options (index.php:140)
Source (user input) Sink (dangerous op) Sanitizer Transform Unsanitized Sanitized
Attack Surface

Kin Visitantes Attack Surface

Entry Points0
Unprotected0
WordPress Hooks 3
actionwp_dashboard_setupindex.php:85
actionwp_footerindex.php:138
actionadmin_menuindex.php:237
Maintenance & Trust

Kin Visitantes Maintenance & Trust

Maintenance Signals

WordPress version tested4.1.42
Last updatedDec 30, 2014
PHP min version
Downloads2K

Community Trust

Rating60/100
Number of ratings2
Active installs10
Developer Profile

Kin Visitantes Developer Profile

topherjamesknoll

1 plugin · 10 total installs

84
trust score
Avg Security Score
85/100
Avg Patch Time
30 days
View full developer profile
Detection Fingerprints

How We Detect Kin Visitantes

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/kin-visitantes/js/kin-visitantes.js/wp-content/plugins/kin-visitantes/css/kin-visitantes.css
Script Paths
https://www.google.com/jsapi
Version Parameters
kin-visitantes/js/kin-visitantes.js?ver=kin-visitantes/css/kin-visitantes.css?ver=

HTML / DOM Fingerprints

CSS Classes
mc-field-groupmc-embedded-subscribe-formmc-embedded-subscribemc-embed-signup
HTML Comments
<!-- _ _______ _ _ __ ________ ____ _____ ______ _____ _____ _____ _ _ | |/ /_ _| \ | | \ \ / / ____| _ \ | __ \| ____|/ ____|_ _/ ____| \ | | | ' / | | | \| | \ \ /\ / /| |__ | |_) | | | | | |__ | (___ | || | __| \| | | < | | | . ` | \ \/ \/ / | __| | _ < | | | | __| \___ \ | || | |_ | . ` | | . \ _| |_| |\ | \ /\ / | |____| |_) | | |__| | |____ ____) |_| || |__| | |\ | |_|\_\_____|_| \_| \/ \/ |______|____/ |_____|______|_____/|____\_____|_| \_| -->
Data Attributes
id="chart_div"name="ignored_ip"name="FNAME"name="LNAME"name="EMAIL"id="mce-FNAME"+7 more
JS Globals
google.loadgoogle.setOnLoadCallbackdrawChartgoogle.visualization.arrayToDataTablegoogle.visualization.AreaChartnew google.visualization.AreaChart
FAQ

Frequently Asked Questions about Kin Visitantes